咨询与建议

限定检索结果

文献类型

  • 276 篇 会议
  • 154 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 291 篇 工学
    • 234 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 60 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 40 篇 生物工程
    • 21 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 18 篇 光学工程
    • 15 篇 仪器科学与技术
    • 14 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 9 篇 土木工程
    • 9 篇 化学工程与技术
    • 9 篇 环境科学与工程(可...
    • 8 篇 建筑学
  • 130 篇 理学
    • 70 篇 数学
    • 39 篇 生物学
    • 22 篇 系统科学
    • 20 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
  • 96 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 26 篇 医学
    • 25 篇 基础医学(可授医学...
    • 24 篇 临床医学
    • 14 篇 公共卫生与预防医...
    • 9 篇 药学(可授医学、理...
  • 20 篇 法学
    • 14 篇 社会学
  • 8 篇 教育学
  • 6 篇 经济学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 17 篇 software enginee...
  • 12 篇 semantics
  • 12 篇 software
  • 10 篇 reinforcement le...
  • 8 篇 edge computing
  • 7 篇 software systems
  • 7 篇 wireless sensor ...
  • 7 篇 analytical model...
  • 7 篇 machine learning
  • 7 篇 artificial intel...
  • 6 篇 internet of thin...
  • 6 篇 conferences
  • 6 篇 ecosystems
  • 6 篇 computer archite...
  • 6 篇 security
  • 5 篇 deep learning
  • 5 篇 decision making
  • 5 篇 accuracy
  • 5 篇 cloud computing
  • 5 篇 open source soft...

机构

  • 8 篇 state key labora...
  • 7 篇 national enginee...
  • 7 篇 shenzhen key lab...
  • 6 篇 the state key la...
  • 6 篇 guangdong labora...
  • 6 篇 state key labora...
  • 6 篇 university of ch...
  • 6 篇 state key lab fo...
  • 6 篇 national water a...
  • 5 篇 national enginee...
  • 5 篇 school of comput...
  • 5 篇 pca lab key lab ...
  • 4 篇 college of compu...
  • 4 篇 information syst...
  • 4 篇 the hong kong po...
  • 4 篇 software enginee...
  • 4 篇 school of comput...
  • 4 篇 institute for so...
  • 4 篇 state key lab of...
  • 4 篇 school of comput...

作者

  • 15 篇 ismail leila
  • 11 篇 buyya rajkumar
  • 9 篇 leila ismail
  • 8 篇 guangming xie
  • 8 篇 wang chen
  • 8 篇 chen wang
  • 7 篇 rabiser rick
  • 7 篇 xie guangming
  • 7 篇 yang jian
  • 6 篇 ghose aditya k.
  • 6 篇 ying he
  • 5 篇 lochau malte
  • 5 篇 lê lam-son
  • 5 篇 feichtinger kevi...
  • 5 篇 xia xin
  • 5 篇 choo kim-kwang r...
  • 5 篇 ghose aditya
  • 5 篇 schmidt-thieme l...
  • 5 篇 f. richard yu
  • 4 篇 xuechen zhao

语言

  • 410 篇 英文
  • 21 篇 其他
  • 5 篇 中文
检索条件"机构=Software and Systems Engineering Lab"
436 条 记 录,以下是231-240 订阅
排序:
Know your enemy: Characteristics of cyber-attacks on medical imaging devices
arXiv
收藏 引用
arXiv 2018年
作者: Mahler, Tom Nissim, Nir Shalom, Erez Goldenberg, Israel Hassman, Guy Makori, Arnon Kochav, Itzik Elovici, Yuval Shahar, Yuval Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel Malware-Lab Cyber-Security Research Center Ben-Gurion University of the Negev Beer-Sheva Israel Clalit Health Services Tel-Aviv Israel
Purpose: Used extensively in the diagnosis, treatment, and prevention of disease, Medical Imaging Devices (MIDs), such as Magnetic Resonance Imaging (MRI) or Computed Tomography (CT) machines, play an important role i... 详细信息
来源: 评论
IoTChain: A three-tier blockchain-based IoT security architecture
arXiv
收藏 引用
arXiv 2018年
作者: Bao, Zijian Shi, Wenbo He, Debiao Choo, Kim-Kwang Raymond Department of Computer Science and Engineering Northeastern University Shenyang China School of Computer and Communication Engineering Northeastern University Qinhuangdao China State Key Lab of Software Engineering Computer School Wuhan University Wuhan China Department of Information Systems and Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX78249 United States
There has been increasing interest in the potential of blockchain in enhancing the security of devices and systems, such as Internet of Things (IoT). In this paper, we present a blockchain-based IoT security architect... 详细信息
来源: 评论
Causes of psychological reactance in human-computer interaction: A literature review and survey  17
Causes of psychological reactance in human-computer interact...
收藏 引用
35th Annual Conference of the European Association of Cognitive Ergonomics, ECCE 2017
作者: Ehrenbrink, Patrick Prezenski, Sabine Institute of Software Engineering and Theoretical Computer Science Quality and Usability Lab Technische Universitt Berlin Ernst-Reuter-Platz 7 Berlin10587 Germany Mechanical Engineering and Transport Systems Cognitive Modeling in Dynamic Human-Machine Systems Technische Universitt Berlin Marchstr. 23 Berlin10587 Germany
Psychological reactance is a psychological effect that can reduce the acceptance of devices and services. So far, there has not been a collection of potential causes for reactance in the context of human-computer inte... 详细信息
来源: 评论
Scenario challenges for next generation aviation technology demonstrations
Scenario challenges for next generation aviation technology ...
收藏 引用
AIAA Modeling and Simulation Technologies Conference, 2018
作者: Moallemi, Mohammad Jafer, Shafagh Chhaya, Bharvi Castro, Carlos A. Embry-Riddle Aeronautical University Daytona BeachFL32114-3900 United States Next Generation Applied Research Lab Embry-Riddle Aeronautical University Daytona Beach Campus Sim Bldg 127 600 S Clyde Morris Blvd Daytona BeachFL32114-3900 United States Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona Beach Campus Lehman 343 600 S Clyde Morris Blvd Daytona BeachFL32114-3900 United States
The Federal Aviation Administration’s (FAA) Next Generation Air Transportation System (NextGen) program is a long-term modernization and transformation of the current National Airspace System (NAS) into a more effici... 详细信息
来源: 评论
Architecture-aware design and implementation of CNN algorithms for embedded inference: the ALOHA project
Architecture-aware design and implementation of CNN algorith...
收藏 引用
International Conference on Microelectronics, ICM
作者: Paolo Meloni Daniela Loi Gianfranco Deriu Andy D. Pimentel Dolly Saprat Maura Pintort Battista Biggio Oscar Ripolles David Solans Francesco Conti Luca Benini Todor Stefanov Svetlana Minakova Bernhard Moser Natalia Shepeleva Michael Masin Francesca Palumbo Nikos Fragoulis Ilias Theodorakopoulos Department of Electrical and Electronic Engineering University of Cagliari Italy Institute of Informatics University of Amsterdam The Netherlands Pluribus One Italy CA Technologies Spain Integrated Systems Laboratory ETH Zurich Switzerland Institute of Advanced Computer Science Leiden University The Netherlands Software Competence Center Hagenberg Austria IBM Research - Haifa Israel IDEA Lab University of Sassari Italy IRIDA Labs Computer Vision Systems Greece
The use of Deep Learning (DL) algorithms is increasingly evolving in many application domains. Despite the rapid growing of algorithm size and complexity, performing DL inference at the edge is becoming a clear trend ... 详细信息
来源: 评论
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
A privacy-aware two-factor authentication protocol based on ...
收藏 引用
作者: Jiang, Qi Kumar, Neeraj Ma, Jianfeng Shen, Jian He, Debiao Chilamkurti, Naveen School of Cyber Engineering Xidian University Xi'an China Co-innovation Center for Information Supply and Assurance Technology Anhui University Hefei China Department of Computer Science and Engineering Thapar University Patiala India School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Lab of Software Engineering Computer School Wuhan University Wuhan China Department of Computer Systems and Computer Science La Trobe University Melbourne Australia
As one of the enabling components of Internet of things (IoT), wireless sensor networks (WSNs) have found applications in a wide range of fields, in which outside users need to directly interact with sensors to obtain... 详细信息
来源: 评论
Asymmetrical Multilevel Inverter Topology with Reduced Number of Components
Asymmetrical Multilevel Inverter Topology with Reduced Numbe...
收藏 引用
International Conference on Power Electronic Drives and Energy systems for Industrial Growth
作者: Marif Daula Siddique Saad Mekhilef Noraisyah Mohamed Shah Adil Sarwar Mudasir Ahmad Memon Mehdi Seyedmahmoudian Ben Horan Alex Stojcevski Koki Ogura Muhyaddin Rawa Hussain Bassi Power Electronics and Renewable Energy Research Lab (PEARL) University of Malaya Kuala Lumpur Malaysia Department of Electrical Engineering Aligarh Muslim University Aligarh India School of Software and Electrical Engineering Swinburne University Victoria Australia School of Engineering Deakin University Victoria Australia Department of Electrical Engineering Kyushu Sangyo University Fukuoka Japan Center of Research Excellence in Renewable Energy and Power Systems King Abdulaziz University Jeddah Saudi Arabia Department of Electrical and Computer Engineering King Abdulaziz University Rabigh Saudi Arabia
A new hybrid structure of multilevel inverter topology is recommended in this paper. It is designed with the aim of reducing the number of components with more number of levels at the output. Proposed topology uses th... 详细信息
来源: 评论
Piggybacking on an autonomous hauler: Business models enabling a system-of-systems approach to mapping an underground mine
arXiv
收藏 引用
arXiv 2017年
作者: Borg, Markus Olsson, Thomas Svensson, John Software and Systems Engineering Lab RISE SICS AB Lund Sweden Linköping University Boliden Mineral AB Boliden Sweden
With ever-increasing productivity targets in mining operations, there is a growing interest in mining automation. In future mines, remote-controlled and autonomous haulers will operate underground guided by LiDAR sens... 详细信息
来源: 评论
A cloud-based taxi trace mining framework for smart city
A cloud-based taxi trace mining framework for smart city
收藏 引用
作者: Liu, Jin Yu, Xiao Xu, Zheng Choo, Kim-Kwang Raymond Hong, Liang Cui, Xiaohui State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China Third Research Institute of Ministry of Public Security Shanghai China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX United States School of Information Technology and Mathematical Science University of South Australia AdelaideSA Australia School of Information Management Wuhan University Wuhan China International School of Software Wuhan University Wuhan China
As a well-known field of big data applications, smart city takes advantage of massive data analysis to achieve efficient management and sustainable development in the current worldwide urbanization process. An importa... 详细信息
来源: 评论
Analyzing closeness of code dependencies for improving IR-based Traceability Recovery
Analyzing closeness of code dependencies for improving IR-ba...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Hongyu Kuang Jia Nie Hao Hu Patrick Rempel Jian Lü Alexander Egyed Patrick Mäder State Key Lab for Novel Software Technology Nanjing University Nanjing Jiangsu China Institute for Software Systems Engineering Johannes Kepler University Linz Austria Fakultät für Informatik und Automatisierung Technische Universität Ilmenau Ilmenau Germany
Information Retrieval (IR) identifies trace links based on textual similarities among software artifacts. However, the vocabulary mismatch problem between different artifacts hinders the performance of IR-based approa... 详细信息
来源: 评论